{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T15:58:14Z","timestamp":1772553494053,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T00:00:00Z","timestamp":1687392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T00:00:00Z","timestamp":1687392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 62272120, 62106030"],"award-info":[{"award-number":["No. 62272120, 62106030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 62272120, 62106030"],"award-info":[{"award-number":["No. 62272120, 62106030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technology Innovation and Application Development Projects of Chongqing","award":["No. cstc2021jscx-gksbX0032, cstc2021jscx-gksbX0029"],"award-info":[{"award-number":["No. cstc2021jscx-gksbX0032, cstc2021jscx-gksbX0029"]}]},{"name":"Technology Innovation and Application Development Projects of Chongqing","award":["No. cstc2021jscx-gksbX0032, cstc2021jscx-gksbX0029"],"award-info":[{"award-number":["No. cstc2021jscx-gksbX0032, cstc2021jscx-gksbX0029"]}]},{"name":"Research Program of Basic Research and Frontier Technology of Chongqing","award":["No. cstc2021jcyj-msxmX0530"],"award-info":[{"award-number":["No. cstc2021jcyj-msxmX0530"]}]},{"name":"Key R & D plan of Hainan Province","award":["No. ZDYF2021GXJS006"],"award-info":[{"award-number":["No. ZDYF2021GXJS006"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the widespread use of blockchain, more and more smart contracts are being deployed, and their internal logic is getting more and more sophisticated. Due to the large false positive rate and low detection accuracy of most current detection methods, which heavily rely on already established detection criteria, certain smart contracts additionally call for human secondary detection, resulting in low detection efficiency. In this study, we propose HGAT, a hierarchical graph attention network-based detection model, in order to address the aforementioned issues as well as the shortcomings of current smart contract vulnerability detection approaches. First, using Abstract Syntax Tree (AST) and Control Flow Graph, the functions in the smart contract are abstracted into code graphs (CFG). Then abstract each node in the code subgraph, extract the node features, utilize the graph attention mechanism GAT, splice the obtained vectors to form the features of each line of statements and use these features to detect smart contracts. To create test data and assess HGAT, we leverage the open-source smart contract vulnerability sample dataset. The findings of the experiment indicate that this method can identify smart contract vulnerabilities more quickly and precisely than other detection techniques.<\/jats:p>","DOI":"10.1186\/s13677-023-00459-x","type":"journal-article","created":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T06:09:07Z","timestamp":1687414147000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["HGAT: smart contract vulnerability detection method based on hierarchical graph attention network"],"prefix":"10.1186","volume":"12","author":[{"given":"Chuang","family":"Ma","sequence":"first","affiliation":[]},{"given":"Shuaiwu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guangxia","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,22]]},"reference":[{"key":"459_CR1","doi-asserted-by":"publisher","first-page":"108432","DOI":"10.1016\/j.comnet.2021.108432","volume":"199","author":"Y Liu","year":"2021","unstructured":"Liu Y, Xu G (2021) Fixed degree of decentralization dpos consensus mechanism in blockchain based on adjacency vote and the average fuzziness of vague value. Comput Netw 199:108432","journal-title":"Comput Netw"},{"issue":"6","key":"459_CR2","doi-asserted-by":"publisher","first-page":"4252","DOI":"10.1109\/TII.2019.2955719","volume":"16","author":"G Xu","year":"2020","unstructured":"Xu G, Liu Y, Khan PW (2020) Improvement of the dpos consensus mechanism in blockchain based on vague sets. IEEE Trans Ind Inform 16(6):4252\u20134259. https:\/\/doi.org\/10.1109\/TII.2019.2955719","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"459_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MIC.2018.2881518","volume":"23","author":"O Scekic","year":"2019","unstructured":"Scekic O, Nastic S, Dustdar S (2019) Blockchain-supported smart city platform for social value co-creation and exchange. IEEE Internet Comput 23(1):19\u201328. https:\/\/doi.org\/10.1109\/MIC.2018.2881518","journal-title":"IEEE Internet Comput"},{"issue":"1","key":"459_CR4","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TNSE.2021.3068340","volume":"9","author":"J Du","year":"2021","unstructured":"Du J, Cheng W, Lu G, Cao H, Chu X, Zhang Z, Wang J (2021) Resource pricing and allocation in mec enabled blockchain systems: An a3c deep reinforcement learning approach. IEEE Trans Netw Sci Eng 9(1):33\u201344","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"5","key":"459_CR5","doi-asserted-by":"publisher","first-page":"3220","DOI":"10.1109\/TCOMM.2022.3163439","volume":"70","author":"J Feng","year":"2022","unstructured":"Feng J, Zhang W, Pei Q, Wu J, Lin X (2022) Heterogeneous computation and resource allocation for wireless powered federated edge learning systems. IEEE Trans Commun 70(5):3220\u20133233","journal-title":"IEEE Trans Commun"},{"issue":"11","key":"459_CR6","first-page":"2687","volume":"33","author":"J Feng","year":"2021","unstructured":"Feng J, Liu L, Pei Q, Li K (2021) Min-max cost optimization for efficient hierarchical federated learning in wireless edge networks. IEEE Trans Parallel Distrib Syst 33(11):2687\u20132700","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"459_CR7","doi-asserted-by":"crossref","unstructured":"Mao S, Liu L, Zhang N, Dong M, Zhao J, Wu J, Leung VC (2022) Reconfigurable intelligent surface-assisted secure mobile edge computing networks. IEEE Trans Veh Technol 71(6):6647\u201360","DOI":"10.1109\/TVT.2022.3162044"},{"key":"459_CR8","doi-asserted-by":"crossref","unstructured":"Xu G, Dong J, Ma C, Liu J, Cliff UGO (2022) A certificateless signcryption mechanism based on blockchain for edge computing. IEEE Internet Things J","DOI":"10.1109\/JIOT.2022.3151359"},{"issue":"5","key":"459_CR9","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/MNET.001.1900656","volume":"34","author":"D He","year":"2020","unstructured":"He D, Deng Z, Zhang Y, Chan S, Cheng Y, Guizani N (2020) Smart contract vulnerability analysis and security audit. IEEE Netw 34(5):276\u2013282. https:\/\/doi.org\/10.1109\/MNET.001.1900656","journal-title":"IEEE Netw"},{"issue":"2","key":"459_CR10","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TSC.2019.2949561","volume":"13","author":"X Wang","year":"2020","unstructured":"Wang X, He J, Xie Z, Zhao G, Cheung SC (2020) Contractguard: Defend Ethereum smart contracts with embedded intrusion detection. IEEE Trans Serv Comput 13(2):314\u2013328. https:\/\/doi.org\/10.1109\/TSC.2019.2949561","journal-title":"IEEE Trans Serv Comput"},{"key":"459_CR11","doi-asserted-by":"crossref","unstructured":"Xing C, Chen Z, Chen L, Guo X, Zheng Z, Li J (2020) A new scheme of vulnerability analysis in smart contract with machine learning. Wirel Netw 1\u201310","DOI":"10.1007\/s11276-020-02379-z"},{"key":"459_CR12","doi-asserted-by":"crossref","unstructured":"FU M, WU L, HONG Z, Wenbo F (2019) Research on vulnerability mining technique for smart contracts. J Comput Appl 39(7):1959","DOI":"10.1109\/ACCESS.2019.2947146"},{"issue":"2014","key":"459_CR13","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj Yellow Pap 151(2014):1\u201332","journal-title":"Ethereum Proj Yellow Pap"},{"key":"459_CR14","doi-asserted-by":"crossref","unstructured":"Dika A, Nowostawski M (2018) Security vulnerabilities in Ethereum smart contracts. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,\u00a0Halifax, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 955\u2013962","DOI":"10.1109\/Cybermatics_2018.2018.00182"},{"issue":"7","key":"459_CR15","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TCAD.2008.923410","volume":"27","author":"V D\u2019Silva","year":"2008","unstructured":"D\u2019Silva V, Kroening D, Weissenbacher G (2008) A survey of automated techniques for formal software verification. IEEE Trans Comput Aided Des Integr Circ Syst 27(7):1165\u20131178. https:\/\/doi.org\/10.1109\/TCAD.2008.923410","journal-title":"IEEE Trans Comput Aided Des Integr Circ Syst"},{"key":"459_CR16","doi-asserted-by":"publisher","unstructured":"Luu L, Chu DH, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA, CCS \u201916, p 254\u2013269. https:\/\/doi.org\/10.1145\/2976749.2978309","DOI":"10.1145\/2976749.2978309"},{"key":"459_CR17","doi-asserted-by":"publisher","unstructured":"Amani S, B\u00e9gel M, Bortin M, Staples M (2018) Towards verifying Ethereum smart contract bytecode in Isabelle\/hol. In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, Association for Computing Machinery, New York, NY, USA, CPP 2018, p 66\u201377. https:\/\/doi.org\/10.1145\/3167084","DOI":"10.1145\/3167084"},{"key":"459_CR18","doi-asserted-by":"publisher","unstructured":"Bhargavan K, Delignat-Lavaud A, Fournet C, Gollamudi A, Gonthier G, Kobeissi N, Kulatova N, Rastogi A, Sibut-Pinote T, Swamy N, Zanella-B\u00e9guelin S (2016) Formal verification of smart contracts: Short paper. In: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, Association for Computing Machinery, New York, NY, USA, PLAS \u201916, p 91\u201396. https:\/\/doi.org\/10.1145\/2993600.2993611","DOI":"10.1145\/2993600.2993611"},{"key":"459_CR19","unstructured":"Mueller B, Honig J, Parasaram N (2018) Consensys\/mythril.\u00a0https:\/\/github.com\/ConsenSys\/mythril. Accessed 5 Sept 2022"},{"key":"459_CR20","doi-asserted-by":"crossref","unstructured":"Tsankov P, Dan A, Cohen DD, Gervais A, Buenzli F, Vechev M (2018) Securify: Practical security analysis of smart contracts. arXiv:1806.01143","DOI":"10.1145\/3243734.3243780"},{"key":"459_CR21","doi-asserted-by":"crossref","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y (2018) Smartcheck: Static analysis of Ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain,\u00a0Moscow, pp 9\u201316","DOI":"10.1145\/3194113.3194115"},{"key":"459_CR22","doi-asserted-by":"crossref","unstructured":"Grishchenko I, Maffei M, Schneidewind C (2018) Foundations and tools for the static analysis of Ethereum smart contracts. In: International Conference on Computer Aided Verification, Springer, pp 51\u201378","DOI":"10.1007\/978-3-319-96145-3_4"},{"key":"459_CR23","doi-asserted-by":"crossref","unstructured":"Di\u00a0Angelo M, Salzer G (2019) A survey of tools for analyzing Ethereum smart contracts. In: 2019 IEEE international conference on decentralized applications and infrastructures (DAPPCON), IEEE, pp 69\u201378","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"459_CR24","doi-asserted-by":"publisher","unstructured":"He J, Balunovi\u0107 M, Ambroladze N, Tsankov P, Vechev M (2019) Learning to fuzz from symbolic execution with application to smart contracts. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA, CCS \u201919, p 531\u2013548. https:\/\/doi.org\/10.1145\/3319535.3363230","DOI":"10.1145\/3319535.3363230"},{"issue":"2","key":"459_CR25","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2020","unstructured":"Wang W, Song J, Xu G, Li Y, Wang H, Su C (2020) Contractward: Automated vulnerability detection models for Ethereum smart contracts. IEEE Trans Netw Sci Eng 8(2):1133\u20131144","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"459_CR26","doi-asserted-by":"publisher","first-page":"2144","DOI":"10.1109\/TIFS.2021.3050051","volume":"16","author":"J Huang","year":"2021","unstructured":"Huang J, Han S, You W, Shi W, Liang B, Wu J, Wu Y (2021) Hunting vulnerable smart contracts via graph embedding based bytecode matching. IEEE Trans Inf Forensic Secur 16:2144\u20132156. https:\/\/doi.org\/10.1109\/TIFS.2021.3050051","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"459_CR27","doi-asserted-by":"publisher","unstructured":"Gori M, Monfardini G, Scarselli F (2005) A new model for learning in graph domains. In: Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005, vol\u00a02. pp 729\u2013734. https:\/\/doi.org\/10.1109\/IJCNN.2005.1555942","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"459_CR28","unstructured":"Denton EL, Zaremba W, Bruna J, LeCun Y, Fergus R (2014) Exploiting linear structure within convolutional networks for efficient evaluation. In: Advances in Neural Information Processing Systems,\u00a0Cambridge, vol\u00a027"},{"key":"459_CR29","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Li\u00f3 P, Bengio Y (2017) Graph attention networks. arXiv:1710.10903"},{"key":"459_CR30","doi-asserted-by":"crossref","unstructured":"Ma R, Jian Z, Chen G, Ma K, Chen Y (2019) Rejection: A AST-based reentrancy vulnerability detection method. In: Chinese Conference on Trusted Computing and Information Security, Springer, pp 58\u201371","DOI":"10.1007\/978-981-15-3418-8_5"},{"key":"459_CR31","doi-asserted-by":"publisher","unstructured":"Xu X, Liu C, Feng Q, Yin H, Song L, Song D (2017) Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. https:\/\/doi.org\/10.1145\/3133956.3134018","DOI":"10.1145\/3133956.3134018"},{"key":"459_CR32","doi-asserted-by":"crossref","unstructured":"Zhuang Y, Liu Z, Qian P, Liu Q, Wang X, He Q (2020) Smart contract vulnerability detection using graph neural network. In:\u00a0Yokohama, IJCAI, pp 3283\u20133290","DOI":"10.24963\/ijcai.2020\/454"},{"key":"459_CR33","doi-asserted-by":"publisher","unstructured":"Zhou Y, Liu S, Siow J, Du X, Liu Y (2019) Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Adv Neural Inf Process Syst 32. https:\/\/doi.org\/10.48550\/arXiv.1909.03496","DOI":"10.48550\/arXiv.1909.03496"},{"key":"459_CR34","doi-asserted-by":"crossref","unstructured":"Liu Z, Qian P, Wang X, Zhuang Y, Qiu L, Wang X (2021) Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Trans Knowl Data Eng 35(2):1296\u2013310","DOI":"10.1109\/TKDE.2021.3095196"},{"key":"459_CR35","doi-asserted-by":"crossref","unstructured":"Ferreira JF, Cruz P, Durieux T, Abreu R (2020) Smartbugs: A framework to analyze solidity smart contracts. In: 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE),\u00a0Australia,\u00a0Virtual Event, pp 1349\u20131352","DOI":"10.1145\/3324884.3415298"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00459-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00459-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00459-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T06:11:25Z","timestamp":1687414285000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00459-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,22]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["459"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00459-x","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,22]]},"assertion":[{"value":"8 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The work is a novel work and has not been published elsewhere nor is it currently under review for publication elsewhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"93"}}